0% found this document useful (0 votes)
8 views4 pages

Diffie Hellman , AES,Side Channel Attack..

The document explains the Diffie-Hellman algorithm for establishing a shared secret key for secure communications over public networks using elliptic curves. It also details the Advanced Encryption Standard (AES), a widely used encryption algorithm that secures data through a block cipher method with various key lengths. Additionally, it discusses side-channel attacks, which exploit physical parameters to extract secrets from cryptographic systems, highlighting various attack methods such as timing attacks and power analysis.

Uploaded by

kartik101203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views4 pages

Diffie Hellman , AES,Side Channel Attack..

The document explains the Diffie-Hellman algorithm for establishing a shared secret key for secure communications over public networks using elliptic curves. It also details the Advanced Encryption Standard (AES), a widely used encryption algorithm that secures data through a block cipher method with various key lengths. Additionally, it discusses side-channel attacks, which exploit physical parameters to extract secrets from cryptographic systems, highlighting various attack methods such as timing attacks and power analysis.

Uploaded by

kartik101203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Diffie-Hellman algorithm is being used to establish a shared secret that can be

used for secret communications while exchanging data over a public network using the
elliptic curve to generate points and get the secret key using the parameters.

For the sake of simplicity and practical implementation of the algorithm, we will consider
only 4 variables, one prime P and G (a primitive root of P) and two private values a and b.

P and G are both publicly available numbers. Users (say Alice and Bob) pick private
values a and b and they generate a key and exchange it publicly. The opposite person
receives the key and that generates a secret key, after which they have the same secret key
to encrypt.

Step-by-Step explanation is as follows:

Alice Bob

Public Keys available = P, G Public Keys available = P, G

Private Key Selected = a Private Key Selected = b

Key generated X=Ga mod P Key generated Y=G b mod P

Exchange of generated keys takes place

Key received = y key received = x

Generated Secret Key Ka=Y a mod P Generated Secret Key K b=Yb mod P

Algebraically, it can be shown that Ka=Kb

Users now have a symmetric secret key to encrypt


Advanced Encryption Standard (AES) is a specification for the encryption
of electronic data . AES is widely used today as it is much stronger than DES and triple
DES despite being harder to implement.

Advanced Encryption Standard (AES) is a highly trusted encryption algorithm used to


secure data by converting it into an unreadable format without the proper key. AES
encryption uses various key lengths (128, 192, or 256 bits) to provide strong protection
against unauthorized access. This data security measure is efficient and widely
implemented in securing internet communication, protecting sensitive data, and encrypting
files. AES, a cornerstone of modern cryptography, is recognized globally for its ability to
keep information safe from cyber threats.

AES is a Block Cipher. The key size can be 128/192/256 bits. Encrypts data in blocks of
128 bits each.

That means it takes 128 bits as input and outputs 128 bits of encrypted cipher text. AES
relies on the substitution-permutation network principle, which is performed using a series
of linked operations that involve replacing and shuffling the input data.

Working of The Cipher :AES performs operations on bytes of data rather than in bits.
Since the block size is 128 bits, the cipher processes 128 bits (or 16 bytes) of the input
data at a time. The number of rounds depends on the key length as follows :

128-bit key – 10 rounds , 192-bit key – 12 rounds , 256-bit key – 14 rounds

A Key Schedule algorithm calculates all the round keys from the key. So the initial key is
used to create many different round keys which will be used in the corresponding round of
the encryption.
Encryption (AES) considers each block as a 16-byte (4 byte x 4 byte = 128 ) grid in a
column-major arrangement.

Each round comprises of 4 steps :

SubBytes
ShiftRows
MixColumns
Add Round Key

The last round doesn’t have the MixColumns round. The SubBytes does the substitution
and ShiftRows and MixColumns perform the permutation in the algorithm.

AES is widely used in many applications which require secure data storage and
transmission. Some common use cases include: Database Encryption , Secure
Communications , Data Storage, VPN, Secure Storage of Passwords , File and Disk
Encryption:
side-channel attack (SCA) is a security exploit that attempts to extract secrets
from a chip or a system. This can be achieved by measuring or analyzing various physical
parameters. Examples include supply current, execution time, and electromagnetic
emission. These attacks pose a serious threat to modules that integrate cryptographic
systems. Indeed, many side-channel analysis techniques have proven successful in
breaking an algorithmically robust cryptographic operation and extracting the secret key.

How Does Side Channel attack works?

A side-channel attack does not target a program or its code directly. Rather, a side-channel
attack attempts to gather information or influence the program execution of a system by
measuring or exploiting indirect effects of the system or its hardware. Put simply, a side
channel attack breaks cryptography by exploiting information inadvertently leaked by a
system. One such example is van Eck phreaking attack, which is also known as a Transient
Electromagnetic Pulse Emanation Standard (TEMPEST). This attack monitors the
electromagnetic field (EMF) radiation emitted by a computer screen to view information
before it is encrypted.

Some of the most common attacks are:

Timing attack: Analyzes the time a system spends executing cryptographic algorithms.
Keep on reading: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and
Other Systems

Electromagnetic (EM) attack: Measures and performs a signal analysis on the


electromagnetic radiation emitted from a device.

Simple power analysis (SPA): Directly observes the power and electromagnetic (EM)
variations of a cryptographic system during operations.

Differential power analysis (DPA): Obtains and analyzes detailed statistical


measurements across multiple operations.

Template attack: Recovers cryptographic keys by exploiting an identical “template”


device and comparing side-channel data.

You might also like